Towards Improving the Quality of Present MAC Protocols for LECIM Systems
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 6
Abstract
Wireless networking system is quickly growing in the field of communication technology due to its usefulness and huge applications. To make the system more effective to the users its lower energy consumption, security, reliability and lower cost issues must be considered under any circumstances. Low energy wireless is exceedingly required because the sensors are frequently located where mains power and network infrastructure are not reliably available. The recent development of Low Energy Critical Infrastructure Monitoring (LECIM) has vast applications including: Water leak detection, Bridge/structural integrity monitoring, Oil & gas pipeline monitoring, electric plant monitoring, public transport tracking, Cargo container monitoring, Railroad condition monitoring, Traffic congestion monitoring, Border surveillance, Medical alert for at-risk populations and many more. This proposal Low Energy Critical Infrastructure Monitoring (LECIM) is proposed by the Task Group 4k under IEEE P802.15 WPAN. Although many issues related to its quality are involved, but several Media Access Control (MAC) protocols with different objectives were proposed for LECIM. In this research paper, issues related to energy consumption and wastage in LECIM system, energy savings mechanism, relevant energy conscious MAC protocols have been briefly studied and analyzed. Science Direct, Elsevier, Springer, IEEE Explore, Google Scholar and Wiley digital Library databases were used to search for articles related to the existing MAC protocols well suited for LECIM system. Finally, some ideas have been proposed towards developing energy efficient MAC protocol for LECIM applications in order to fulfill and satisfy the major issues of LECIM quality.
Authors and Affiliations
Mohammad Siddiqui, Shah Al Masud, Mohammed Kamal
LQR Robust Control for Active and Reactive Power Tracking of a DFIG based WECS
This research work sets forward a new formulation of Linear Quadratic Regulator problem (LQR) applied to a Wind Energy Conversion System (WECS). A new necessary and sufficient condition of Lyapunov asymptotic stability i...
Digital Legacy: Posterity Rights Analysis and Proposed Model for Digital Memorabilia Adoption using Machine Learning
The paper informs about the digital legacy and its related concepts of posterity rights and digital memorabilia. It also deals with the right to exercise the digital posterity concerning the social networking profiles (S...
Designing of Cell Coverage in Light Fidelity
The trend of communication has changed and the internet user demands to have higher data rate and secure communication link. Wireless-Fidelity (Wi-Fi) that uses radio waves for communication has been used as an internet...
Improvisation of Security aspect of Steganographic System by applying RSA Algorithm
The applications accessing multimedia systems and content over the internet have grown extremely in the earlier few years. Moreover, several end users or intruders can simply use tools to synthesize and modify valuable i...
Image Compression of MRI Image using Planar Coding
In this paper a hierarchical coding technique for variable bit rate service is developed using embedded zero block coding approach. The suggested approach enhances the variable rate coding by zero tree based block-coding...